Case Study

Anheuser Busch

A Fast-Tracked Security Strategy

Our client is a leading, global beverage brand, holding nearly 50% of the world’s market share for beer. They’re powerhouse in the brewing economy, with a household name brand.

The brewing market is highly competitive and heavily relies on customer loyalty and trust. Our client knew that if they wanted to continue its global growth, they would need to take a fresh eyes approach to its operations and stability, inside and out. This included a careful review of its cybersecurity strategy.

The Challenge

3 YEARS OF SECURITY PACKED INTO 1

Our client knew cybersecurity threats were only going to continue to increase in 2017 and beyond. The facts support this: in just 2016, ransomware instances increased by 50%. While mass malware attacks still account for most attacks, they’re relentless evolving into even more complex, sophisticated attacks. And by 2021, cybercrime will have cost the world’s businesses a staggering $6 trillion.

Our client’s goal: create a strategy that would protect them today while allowing them to continue to scale, safely, into the future. It was aggressive and audacious: Execute what most companies do in three years—in just one

Chronos was called to get it done.

The Strategy

AN END-TO-END ASSESSMENT AND A CUSTOMIZED APPROACH

Chronos kicks off each client engagement with a “Design for Impact” framework. We guarantee that each solution will adhere to these core principles.

  • Cloud first: For all the obvious reasons: streamlined operations, easy deployments and fast scalability.
  • Plug and play: No vendor lock-in. Our architecture makes it easy for clients to change technologies or upgrade, without slowing down or starting from scratch.
  • Automation: We feel that if a solution isn’t automated, it’s broken.
  • Own the IP: Custom solutions designed to fit your needs—no one else’s.

WE FIRST PERFORMED AN END-TO-END ASSESSMENT

We came onsite to work alongside the client’s existing team. This allowed us to have a channel fast communication with senior leaders and collaborate with the team, while we looked under the hood (and gave the security infrastructure a good kick). It also minimized the need for phone calls, information gathering and executive approval since we’re onsite to handle all of that.

We evaluated everything from architecture to software with an eye for automation and the cloud—asking ourselves, how can we instill these advantages into everything we build? The executive team was included and updated –daily—with every decision along the way.

WE BUILT THEIR IT SECURITY INFRASTRUCTURE FROM THE GROUND UP

We brought a small team onsite, full-time, to manage the entire project from start to finish. We rewrote policies. Built an entirely new architecture, rock solid. We created and managed its email and URL filtering solution; devised a comprehensive endpoint security plan; implemented authentication and aggregate log solutions; procured all necessary hardware; creating a training plan.

WE PUT AN OPERATIONS SYSTEM IN PLACE TO KEEP THEM RUNNING

We hand-selected a managed service provider (MSP) to take over the reins of the day to day operations and incident response. We create operations guidelines and policies to ensure a smooth hand-off when our year term was finalized.

The Results

FULLY CAUGHT UP AND FUTURE PROOFED

By leveraging Chronos’ deep industry expertise, our client modernized its entire security plan while completely sheltering its day to day operations. Re-thinking their security architecture and adopting our “Design for Impact” approach, our client is better equipped than ever to take on any security challenges and rapidly respond to new ones. Their systems are in the best shape they’ve ever been in, with the right controls and policies in place to protect the business from cyberthreats.

Takeaways

6
Security technologies deployed and managed

15

Countries

180

Thousand People Supported

WE CREATED CUSTOM PROGRAMS TO SUPPORT OUR CLIENT’S UNIQUE CHALLENGES

  • Advanced Security Analytics
  • Security Automation & Orchestration
  • Network Threat Detection, Management and Prevention
  • Advanced Network Malware Protection
  • Advanced End-point Protection
  • Incident Forensics, Analysis and Response